Windows Defender Real-Time Behavior Monitoring Disabled via Registry Modification
Attackers modify Windows Registry keys associated with Windows Defender to disable real-time behavior monitoring, a common tactic used by malware to evade detection and persist on compromised systems.
Attackers often disable real-time behavior monitoring in Windows Defender to evade detection and maintain persistence on compromised systems. This involves modifying specific registry keys to turn off real-time protection features. Disabling these features allows malware such as Remote Access Trojans (RATs), bots, and Trojans to operate undetected. The targeted registry keys control various aspects of real-time protection, including behavior monitoring, on-access scanning, and script scanning. Successful disabling of these features can lead to privilege escalation, arbitrary code execution, and long-term persistence.
Attack Chain
- The attacker gains initial access to the system, possibly through phishing or exploitation of a vulnerability.
- The attacker executes a script or binary with administrative privileges.
- The script or binary modifies the registry to disable Windows Defender’s real-time behavior monitoring by setting specific registry values to “0x00000001”.
- Specifically, the registry keys targeted include those under
SOFTWARE\\Policies\\Microsoft\\Windows Defender\\Real-Time Protection\\andSOFTWARE\\Microsoft\\Windows Defender\\Real-Time Protection\\. - The attacker disables Behavior Monitoring by modifying
DisableBehaviorMonitoring. - The attacker disables On Access Protection by modifying
DisableOnAccessProtection. - The attacker disables Script Scanning by modifying
DisableScriptScanning. - With real-time protection disabled, the attacker can now execute malicious code, escalate privileges, and establish persistence without immediate detection.
Impact
Successful disabling of Windows Defender’s real-time behavior monitoring allows malware to operate undetected. This can lead to data exfiltration, ransomware deployment, or the establishment of a persistent foothold within the compromised environment. Organizations may experience significant data loss, financial damage, and reputational harm.
Recommendation
- Deploy the Sigma rule
Detect Windows Defender Real-Time Protection Disableto your SIEM to identify registry modifications related to disabling Windows Defender’s real-time protection features. - Enable Sysmon Event ID 13 (Registry Event) with appropriate filtering to capture registry modifications.
- Investigate any alerts triggered by the Sigma rule
Detect Windows Defender Real-Time Protection Disablepromptly to determine the legitimacy of the registry modifications. - Monitor endpoints for unexpected or unauthorized registry modifications, particularly those affecting Windows Defender settings.
Detection coverage 2
Detect Windows Defender Real-Time Protection Disable
highDetects modifications to the registry that disable Windows Defender's real-time protection features.
Detect Process Modifying Windows Defender Registry Keys
mediumDetects processes modifying registry keys associated with disabling Windows Defender real-time protection.
Detection queries are kept inside the platform. Get full rules →